ACHIEVING THE DOD INFORMATION ENTERPRISE

Transcription

1

2 F OREWORD Intelligence and information sharing have always been a vital component of national security. Reliable information and analysis, quickly available, is an enduring challenge The goal is to break down barriers and transform industrial-era organizational structures into an information and knowledgebased enterprise. These concepts will require investments in people as much as in technology to realize the full potential of these initiatives. -National Defense Strategy, June 2008 The National Defense Strategy of June 2008 highlighted the importance of information sharing to national security. The strategy noted that providing secure, assured, and reliable information requires not only technological changes, but also changes that break down cultural barriers impeding progress. With this in mind, the aim of the Assistant Secretary of Defense (Networks and Information Integration)/Department of Defense Chief Information Officer (ASD(NII)/DoD CIO) is to achieve an information advantage for our people and mission partners (including multinational partners) by leveraging net-centric information sharing. The ASD(NII)/DoD CIO s vision is that: We are about mission success. The mission accompanying this vision is based on the understanding that: Information is one of our nation s greatest sources of power. Our first and greatest goal, therefore, is to bring that power to the achievement of mission success in all operations of the Department. Delivering this vision means treating information as a strategic asset; establishing a robust, reliable, rapidly scalable and interoperable infrastructure; and achieving synchronized and responsive operation of the DoD Information Enterprise (IE); all while protecting and defending information and information systems against adverse events. To realize this vision, the Department must optimize Information Technology (IT) investments and more rapidly deploy IT capabilities, drawing on a highly skilled, innovative workforce shaped to meet these emerging and expanding mission requirements. While each of these goals is important in its own right, all six goals in this plan are co-dependent and therefore must work together to attain the vision. This DoD Information Enterprise Strategic Plan (which supersedes the DoD Information Management (IM)/IT Strategic Plan) establishes goals, objectives and strategies that reinforce the goals and objectives of related portfolio strategic plans, including Command and Control (C2) and Net-Centric Capabilities. Developing this plan in itself embodies a key aspect of DoD s vision leveraging the power of mass collaboration. Specifically, this plan was developed using Intellipedia, the Intelligence Community (IC)-hosted social networking wiki toolset. Success stories in this plan represent a small set of the many initiatives leading to the achievement of each goal. The implementation of the DoD IE Strategic Plan s goals will be managed in a roadmap using the same wiki functionality. Consequently, DoD leaders will be better able to assess progress, discover gaps and overlaps, locate information for decision support, and contribute information regarding relevant policies, programs, and initiatives. This wiki approach enables a dynamic, continuous strategic planning process encouraging unprecedented levels of participation in crafting the DoD IE Strategic Plan s goals, objectives, and strategy elements. This approach enabled a core team encompassing CIO representatives from all Military Departments (MILDEPs), the Defense Information Systems Agency (DISA), and the Joint Staff, as well as elements from across the ASD(NII)/DoD CIO staff to develop the plan collaboratively. The explosion of Intellipedia usage and other information sharing efforts vividly demonstrate how DoD is beginning to apply information sharing capabilities in innovative and highly effective ways. This plan builds on those successes and adds momentum to our efforts to achieve an information advantage for our people and mission partners. i

3 ACHIEVING THE DOD INFORMATION ENTERPRISE The DoD Information Enterprise, which enables a new, net-centric 1 way of working, is constructed from the information itself, as well as a set of standards, services and procedures that enable information to be widely available to authorized users. The delivered set of services and tools will provide information and capabilities that enable end-user communities to more effectively and efficiently support mission operations. Finally, the DoD Information Enterprise includes the networks over which information travels and the security protocols that protect it. The DoD IE Strategic Plan forms the basis for a broad approach to achieving the DoD Information Enterprise, which is collectively termed the DoD IE Strategic Plan & Roadmap (IE SP&R). Together, the Strategic Plan and Roadmap meet the requirements of the Government Performance Results Act, as described in Office of Management and Budget (OMB) Circular A-11. Over time, the DoD IE SP&R will deliver the DoD Information Enterprise envisioned by the National Defense Strategy, the National Military Strategy, the Quadrennial Defense Review, and the Department s Global Information Grid (GIG) 2.0 Concept of Operations (CONOPS) and Implementation Plan. Additional guidance is provided by the principles, rules, constraints, and best practices contained in DoD Information Enterprise Architecture v1.1 (DoD IEA). The DoD IE SP&R establishes goals and associated objectives that form the basis for a plan to guide the transformation of DoD from a stove-piped information approach to achieving the Department s net-centric information sharing vision. The DoD IE SP&R fosters alignment of the Department s net-centric information sharing efforts, particularly those specified in the GIG 2.0 Implementation Plan, by identifying, relating and measuring the development and implementation of specific netcentric information sharing policies, programs, and initiatives STRATEGIC PLAN ROADMAP Provides Mission, Vision, Goals, and Objectives Presents alignment of Goals and Objectives with activities DOD CIO ACTIVITIES PERFORMANCE MEASUREMENTS OVERARCHING GOALS AND OBJECTIVES Documents the enabling programs and initiatives to achieve the vision Illuminate gaps and overlaps COMPONENT PROGRAMS AND INITIATIVES Monitor progress Provide agile decision support Establish a baseline and measure performance towards achievement of the Goals and Objectives. The Roadmap portion of the DoD IE SP&R establishes a baseline for measuring the Department s performance in achieving the goals and objectives of the DoD IE Strategic Plan. The DoD IE SP&R also highlights how organizations are leveraging net-centric information sharing capabilities to improve the effectiveness and efficiency of processes across the Department. Strategic planning is one of five levers (policy, planning, governance, performance measurement, and portfolio management) used by the ASD(NII)/ DoD CIO to understand and influence what DoD is doing to improve information sharing. The wiki approach provides an opportunity to gain synergy across these levers through the power of collaboration. DEFINITION OF THE DOD INFORMATION ENTERPRISE The DoD information resources, assets, and processes required to achieve an information advantage and share information across DoD and with mission partners. It includes: (a) the information itself, and the Department s management over the information life cycle; (b) the processes, including risk management, associated with managing information to accomplish the DoD mission and functions; (c) activities related to designing, building, populating, acquiring, managing, operating, protecting and defending the information enterprise; and (d) related information resources such as personnel, funds, equipment, and information technology, including national security systems. 1 The definition of net-centric and other key terms in the DoD IE Strategic Plan can be found in the associated Roadmap s Glossary on Intellipedia. ii

4 Culture Change Culture change taking new perspectives that lead to changed behavior on sharing information is critical to our ability to achieve the vision laid out in this strategic plan. The principles of need-to-share, breaking down silos, and developing reusable, accessible services must become hallmarks of how we approach information. Addressing this culture change permeates this plan, influencing all goals and objectives and how we measure progress. To improve net-centric information sharing, DoD must increase trust in the quality and availability of shared information and services, particularly through greater assurance that others will maintain the integrity and security of shared information. Similarly, to achieve interoperable infrastructure and synchronized operations, DoD must persuasively demonstrate that these strategies will improve computing and communication, and especially provide the capacity to meet surge demand. Implementing an operationally effective identity and information assurance model will require buy-in to the perspective that more flexible approaches to risk management are preferable to organizationally-stovepiped network enclaves that avoid risk by limiting interoperability and accessibility. The Department must also gain wider acceptance of rapid acquisition methods for fielding new IT capabilities that demonstrably improve operational performance. Supporting all this change requires that DoD consider innovative approaches in its Analysis of Alternatives, and develop the workforce correspondingly. To successfully change the culture, DoD must embrace the new mindsets described above and apply new thinking to break down information sharing barriers and more rapidly field critical information sharing solutions. The following story about two online professional development communities, CompanyCommand.mil and PlatoonLeader.mil, described by Dan Baum in a January 2005 New Yorker article, shows how two grassroots efforts demonstrated tremendous value to young officers, and as a result were institutionalized by the U.S. Army. The story below is drawn from that New Yorker article and a related article by Dr. Nancy M. Dixon in NASA s ASK Magazine: CompanyCommand.mil and PlatoonLeader.mil are two community forums launched by two young Army officers in the late 1990 s as unofficial public websites open to registered users. The founders saw an opportunity to leverage the power of the Internet to create a virtual network for sharing and growing professional knowledge. The virtual communities provided valuable information to other young officers who were on the ground in the Iraq and Afghanistan wars, facing leadership situations they had not experienced before. Even at the most remote bases in Iraq, many captains would find at least ten or fifteen minutes every day to check the site. They d post tricks they had learned or ask questions that in some cases set off months of responses in the form of lively discussion threads. For example, a discussion iii

5 on convoy training offered contradictory views on whether to lay sandbags on the floors of vehicles (they provide potential protection from mines, but wear out Humvees), admonitions to look upward as well as to the sides (guerrillas may shoot from rooftops and overpasses), and suggestions for replacing vehicles canvas doors with 8-mm. steel (to stop AK-47 and most frag). By 2004, CompanyCommand s membership reached ten thousand, or more than a third of all captains in the Army; those members went to the site sixty-seven thousand times and looked at more than a million pages. Recognizing the value that these sites were providing, Army senior leadership decided to officially recognize the sites and host them on Army-operated servers. Even after being brought behind the Army firewall, CompanyCommand and PlatoonLeader have retained their grassroots spirit and governance, remaining a community of young officers exchanging knowledge based on the daily struggles of fellow frontline professionals. These online communities have been heralded by the Army as its premier professional forum. 2 The story above illustrates how shifting the culture requires accepting the premise that rapidly sharing knowledge of people and organizations at all levels provides a vital augmentation to traditional, rigid, centrally-approved knowledge sharing approaches. Additionally, the adoption and widespread application of mass collaboration among organizations and people, via social networking tools, helps those organizations and people work together more seamlessly to create more effective solutions than those developed under go-it-alone approaches. Such collaboration enables a broader, more geographically diverse group of people to participate in those processes that will benefit from wider involvement, such as planning, coordination, and analytical activities to name only a few. The success of DoD s information sharing environment is predicated upon achieving secure information sharing within the context of a highly contested information environment. Therefore, a critical aspect of the culture change for DoD is to embrace the notion that in order to maximize the potential of the information sharing enterprise, proper solutions (like cross domain solutions) must enable both sharing information widely and stringent protection mechanisms. Solutions cannot optimize one at the expense of the other. Consequently, the Department aims to change the current information sharing culture to one that understands, embraces and continuously seeks to improve the secure net-centric information enterprise and its enabling processes. These changes should produce more efficient and effective national security processes and aid in increasing the public s trust. 2 Dan Baum, Battle Lessons, The New Yorker, January 17, 2005; Dr. Nancy M. Dixon, CompanyCommand: A Professional Community That Works, ASK Magazine, Issue 27, Summer 2007 iv

6 Information as a Strategic Asset A robust DoD Information Enterprise provides the Department and mission partners access to discoverable, authoritative, relevant, trusted, and actionable information and services to enable effective and agile decisions for mission success. Interoperable Infrastructure A more robust, reliable, rapidly scalable and interoperable infrastructure provides connectivity and computing capabilities that allow all DoD users and mission partners to access, share, and act on the information needed to accomplish their missions. Synchronized & Responsive Operations The DoD Information Enterprise infrastructure, critical assets, and capabilities are operated, secured, and defended in a synchronized manner by all DoD Components to support commanders in achieving mission success. v

7 Identity & Information Assurance A unified and resilient DoD Information Enterprise where only authorized users (including mission partners) have ready access to their information; missions continue under any cybersecurity situation; and associated components perform as expected and act effectively in their own defense. Optimized Investments An integrated DoD Information Enterprise investment and portfolio management capability that maximizes the contribution of information-related investments to national security and defense outcomes. Agile IM/IT/IA Workforce An agile IM/IT/IA workforce able to dynamically operate, defend, and advance the DoD Information Enterprise. vi

8 Information as a Strategic Asset A robust DoD Information Enterprise provides the Department and mission partners access to discoverable, authoritative, relevant, trusted, and actionable information and services to enable effective and agile decisions for mission success. Information is an asset a source of power and a force multiplier. DoD and mission partners will obtain an information advantage when timely, secure and trusted information is available to all decision makers. We are moving rapidly to achieve a service-oriented information enterprise where all data assets, services and information sharing solutions must be visible, accessible, understandable and trusted by all authorized users, except where limited by law, policy or security classifications. Independent data efforts across Combatant Commands (COCOMs), MILDEPs, Defense Agencies and Field Activities, and with mission partners will be aligned and leveraged to improve data quality, integration, transparency and sharing. Once achieved, warfighters will get the critical information they need to make timely decisions affecting operations. DoD s transition from Component-centric, non-interoperable capabilities to joint net-enabled capabilities will be accomplished with community-based solutions and technical solutions such as Service Oriented Architectures (SOAs). Using process-based approaches, communities will identify needed services, define necessary data characteristics, and ensure authoritative sources of information are identified, to support effective information sharing and problem solving. In particular, loosely coupled enterprise services will be available for authorized users to discover and use. For greater efficiency, these services will be brought together in shared services centers or clouds, which are addressed in depth in the Interoperable Infrastructure goal. Cloud computing centers enable data and service transparency, and provide the foundation to run enterprise services securely and consistently across the DoD. These centers are enhanced by cross domain solutions (services) that enable information flow from one domain to another. Providing an information advantage for DoD people and mission partners rests largely upon the ability of the Department to improve its processes by finding, fielding, and exploiting new technologies. Through community-based pilots and experimentation, DoD will mitigate risk by evaluating how well new technologies support agile information sharing, permit alternative uses, and provide cost-effective solutions in response to dynamic mission environments. 1

9 The DoD must share information in a timely and protected manner with multiple U.S. and international partners in a variety of situations that include intelligence, counterterrorism, multinational and stability operations, humanitarian assistance, disaster relief, and homeland defense. By collaborating on the standardization of required data and services, DoD and mission partners will improve their interoperability as necessary to achieve their mission goals. Additionally, DoD will establish methods, policies, and procedures that allow authorized interagency mission partners and non-governmental organizations appropriate access to information needed in support of national security missions. Through the objectives of this goal, DoD together with its mission partners will foster an improved information sharing culture. These improvements will lead to increased availability of mission-essential information. By promoting innovative approaches to sharing and using the information, DoD will achieve an information advantage with shared awareness, interoperable solutions, and greater collaboration across the spectrum of joint and combined operations with mission partners. Objective 1: Current, accessible, secure and reliable information will be available to all authorized users, both known and unanticipated. Key Performance Indicator: Assessment of improvement in our ability to provide current, relevant, and reliable information via protected, trusted and net-centric data sharing solutions. Develop and implement cloud computing techniques, such as the CIO Storefront s publish from the desktop paradigm, to enable transparent data access and visibility. Establish and implement the framework (e.g., methods, policies, and procedures) to identify and empower authoritative bodies for sharing the most commonly used DoD data concepts and assets. Increase the prevalence of metadata tagging in order to make more information discoverable and understandable. Enhance data registry usage and effectiveness, to support the visibility and accessibility of tagged data, by improving policies and procedures. Improve information sharing with mission partners by participating in federal information sharing initiatives such as those identified in the DoD Information Sharing Implementation Plan. Improve information sharing with the public by participating in federal open government and transparency initiatives. 2

10 Objective 2: A balanced suite of DoD Enterprise Services will be visible, accessible, understandable and trusted, enabling net-centric information sharing via a service-oriented information enterprise. Key Performance Indicator: Assessment of status of activities to deliver a synchronized suite of DoD Enterprise Services that are visible, accessible, understandable and trusted. Guide the development and integration of DoD Enterprise Services that extend across the Information Enterprise to achieve a balanced set of near-, mid-, and long-term mission outcomes, and enable delivery of tangible warfighter and intelligence operator capabilities by implementing a dedicated enterprise services strategic planning process. Establish and implement a DoD Enterprise Services Governance Framework to organize, evaluate, and synchronize enterprise services, solutions, and initiatives, and identify resources to enable early implementation across the DoD Information Enterprise. Leverage emerging cloud computing techniques for access to Core Enterprise Services (messaging, content delivery, collaboration, people/service discovery, content discovery, metadata discovery, etc.) and to provide scalable, on-demand and where feasible, cross domain solutions for critical mission needs. Establish and implement a DoD Enterprise Services Security Framework to enable dynamic access control to shared resources and services. Enhance service registry usage and effectiveness through improved guidance and governance that leads to better visibility, accessibility and increased reuse of enterprise services. Objective 3: Community-based solutions will be used to identify, specify, coordinate, and deliver net-centric data and services that improve information sharing and collaboration. Key Performance Indicator: Evaluate the degree to which community-based solutions are being used to provide information sharing capabilities and services. Increase the availability and magnitude of collaborative networking user forums, technical assistance, guidance, training tools and artifacts across user communities to support information sharing. Increase the use of Internet-based capabilities (Web 2.0) that support collaborative development, fielding, and use of community-based information sharing solutions. 3

11 Objective 4: Pilots and experimentation will accelerate insertion of new information technology, mitigate risks, and advance shared enterprise services to improve information sharing within DoD and with mission partners. Key Performance Indicator: Assessment of the degree to which pilots and experimentation transition to sustained capabilities. Advocate and sponsor risk mitigating, community-based experiments and pilots to identify, refine, and field promising data and services that support interoperable, joint, multinational, and interagency operations. Partner with industry, Federally Funded Research and Development Centers, and academia to identify and generate innovative net-centric data and services solutions for information sharing challenges. Increase the availability of information sharing lessons learned from joint experiments, operational concept development, combat operations and other missions. Objective 5: Interoperability, collaboration, and improved information sharing capabilities will be achieved between DoD and mission partners. Key Performance Indicator: Assessment of improvements in information sharing capabilities between DoD and mission partners. Increase interoperability between DoD and mission partners through agreed-upon technical procedures and data standards, which include naming conventions, schemas, interface specifications, and characteristics. Improve collaboratively-developed information sharing capabilities, procedures and services between DoD and mission partners, including federal, other public, private and international enterprises. Remove regulatory and cultural barriers that impede information sharing and interoperability by adjusting policy, and establishing operating protocols, Memorandums of Understanding, and Memorandums of Agreement necessary for joint, interagency and industry relationships. Improve the information sharing culture by providing incentives to DoD activ ities to share information, as appropriate, with agencies, mission partners, industry, and citizens. 4

12 UCore - Facilitating Information Sharing Information sharing between the DoD and its mission partners has been hindered by the evolution of systems that were not designed to communicate with each other. These legacy systems form data stovepipes joined by point-to-point connections and constrained by proprietary formats that require manual entry (and re-entry) of data, and laborious deciphering and costly mediation. Eliminating these barriers is essential for effective information sharing. The Universal Core (UCore) was developed to break down barriers to information sharing by using agreed-upon representations for the most commonly shared and universally understood concepts of who, what, when, and where. Designed to be simple to understand, explain and implement, UCore is a federal information exchange specification that supports the White House s National Strategy for Information Sharing. UCore V2.0 was released on March 31, The Department of Justice (DOJ), the Office of the Director of National Intelligence, the Department of Homeland Security (DHS), and DoD collaboratively developed and endorsed it, drawing on several hundred participants from across the federal government and industry over an 18-month period. This collaboration not only ensured that requirements from many stakeholders were considered, but also significantly increased the likelihood of adoption by socializing the latest changes as they were refined. Organizations are using or evaluating UCore for a variety of important national missions including command and control, ballistic missile defense, counterterrorism, maritime domain awareness, combating improvised explosive devices, and suicide prevention. The Army recently used UCore in their Executive Support System to create an interoperable solution to monitor and track various units readiness to deploy. The solution combines data from multiple, disparate sources; uses a community vocabulary and common data schema; and maps information into UCore-based messages that can then be translated and displayed by these disparate sources. In just five weeks, five different iterations of unit readiness data were created. The speed and accuracy of the data displays demonstrates that UCore can be used to achieve high levels of interoperability and promotes the sharing of information between anticipated and unanticipated users. Navy and the U.S. Northern Command (USNORTHCOM) engineers incorporated UCore into commercial off-the-shelf products to create a mobile force tracking capability. In this project, a UCore-based script was created to enable positional data from Blackberrys and Windows mobile devices to be transmitted and displayed on USNORTHCOM s unclassified common operational picture. This was a low cost, simple deployment that has broad applicability to DoD Homeland Defense-related missions. Through DoD s partnership with DHS and DOJ, this capability is also available to state and local entities in support of emergency response and management missions. DoD and other federal departments and agencies have acknowledged the value of UCore to improve information sharing between known and unanticipated users and save cost/time through reuse and modular design. 5

13 Acquisition Visibility (AV) SOA Until recently, DoD generally limited the collection and dissemination of acquisition information to mandatory reports, which were mostly manually compiled and took months to complete. Consequently, the resulting data was frequently no longer current enough to enable the most accurate acquisition milestone decisions. On February 29, 2008 DoD began managing its Defense acquisition data in a new way by demonstrating that a SOA approach could be used to make acquisition information more broadly available in real time. This initial demonstration presented authoritative values for 61 data elements (including earned value management and unit cost data) from 12 Major Defense Acquisition Programs (MDAPs). A second pilot project further enhanced data availability to 148 data elements (including budget, milestone, Science & Technology, and program administration data) for 103 MDAPs. The overall AV SOA effort has included implementing role-based security, establishing a production capability, bringing additional data elements under governance and enabling access to information on even more programs. A March 2009 memorandum from the Under Secretary of Defense for Acquisition, Technology & Logistics (USD(AT&L)) acknowledged the success of the AV SOA Pilot and directed governance and use of SOA to make acquisition data immediately available to authorized users. One of the most desirable features of the new AV SOA model is that each request for data generates a unique request from the authoritative source for the data needed. In this concept, called data as a service, the data request immediately returns the authoritative data along with the pedigree of that data. These results show that commercial information technology tools, when combined with data governance that includes careful regulation of the data definitions and technical standards, permit secure and transparent use of data from disparate sources. The successful implementation of AV SOA allows Defense acquisition decision makers to accurately assess the status of the Department s portfolio of MDAPs, valued at approximately $1.6T. The AV SOA effort offers a profoundly better approach in which data is simply and transparently available, as soon as it is developed, to anyone throughout the enterprise who has a legitimate need for it. 6

14 interoperable infrastructure A more robust, reliable, rapidly scalable and interoperable infrastructure provides connectivity and computing capabilities that allow all DoD users and mission partners to access, share, and act on the information needed to accomplish their missions. Achieving mission success in today s operational environment, which increasingly involves joint, combined, and non-military partners, requires a dynamic and interoperable infrastructure consisting of communications, transport, and computing capabilities. Gaining and maintaining a persistent and dominant information advantage requires robust world-wide connectivity to enable highly effective information sharing across DoD and with its mission partners. A reliable and rapidly scalable information infrastructure is the foundation for realizing enterprise alignment through greater integration of applications, services and systems, thereby strengthening operational effectiveness and efficiency. This goal focuses on delivering the integrated DoD Information Enterprise infrastructure that the Department needs to harness the power of information. One major challenge facing the Department today is transforming from its legacy of system-specific infrastructures to a shared infrastructure that can deliver capabilities at varying levels to consumers and providers of the Department s data and services. This goal seeks to transform the DoD GIG infrastructure into a more dynamic and adaptable shared environment that is sufficient to support global net-centric operations. As DoD moves further along the net-centric operations path, the Department must transform its infrastructure concept to support new service-oriented approaches, such as cloud computing and virtualization, for sharing, storing, processing and transporting information. Several beneficial outcomes of this approach will be a smaller physical footprint, and reduced need for skilled touch-labor, logistics and electrical power. These outcomes have mission effectiveness benefits for the warfighter and support achieving national environmental objectives through green IT approaches. One aspect of this goal focuses on making shared and virtualized computing resources globally available, driven by the shift from individual military service-focused efforts to a more Department-wide net-centric approach. This new direction will allow for a more dynamic and broader allocation of computing resources that will provide needed computing capabilities to the joint force more rapidly and efficiently. In addition, DoD s communication and computing capabilities will be optimized to strengthen network operations and dynamic allocation of these resources. In order for benefits of these approaches to be realized, the Department needs to have DoD Components consider shared computing capabilities as the preferred option for providing services. Furthermore, migration from non-internet Protocol (IP) and circuit-switched networks to DoD Unified Capabilities (UC), to include IP networks (v4 or v6), is an integral piece of DoD s migration to a converged IP network. To support mission needs, DoD wired and wireless transmission capability must be sufficiently sized, reliable, available, and flexible to accommodate even the bandwidth-constrained users at the tactical edge. In parallel, switching and routing 7

15 capabilities will enable DoD to interface common or disparate communications media or networks, in order to move data and information end-to-end across multiple transmission media. However, this strategy is intended to apply to those DoD and mission partner elements that are persistently connected to the DoD s IP information environment. Ensuring the continued stability and global interoperability of the Internet while increasing security and reliability for all users should be one of the Department s priorities. A robust, resilient Internet is also a key enabler of DoD s ability to carry out a global, modern national defense strategy. Ultimately, it is in DoD s interest that the Internet remains open, stable, and secure. The robust information environment envisioned by this goal demands an aligned approach to achieve a joint infrastructure. This requires a shift in the way that DoD Components think about meeting their computing and information transport needs. The following objectives and strategy elements will enable the Department to manage and measure progress towards the accomplishment of this goal. Objective 1: Shared and virtualized computing resources will be globally available to increase mission effectiveness and efficiency. Key Performance Indicator: Assessment of the degree to which DoD computing service providers make shared and virtualized computing resources globally available on an IP-based network. Better leverage the Defense Acquisition System (DAS), the Planning, Programming, Budgeting and Execution System (PPBES), and the Joint Capabilities Integration Development System (JCIDS) to ensure that DoD Components in their Analysis of Alternatives consider shared computing capabilities as the preferred option for providing services as available and as consistent with national security needs, before acquiring or maintaining dedicated, program-specific resources. Provide an appropriate mix of government and commercial capabilities to increase effectiveness and efficiency through greater use of shared computing resources in the DoD Information Enterprise to include the tactical edge. Identify and remove the obstacles that are impeding greater use of shared computing resources. Develop and implement an approach for delivering shared and virtualized computing resources to users at the tactical edge. Increase the use of standards to support federation of computing capabilities across the Department. Develop and increase the use of authoritative enterprise-level architectures to provide design patterns that constrain and guide infrastructure solutions. Develop and implement a DoD data center realignment and consolidation strategy to achieve more efficient use of resources in support of national green IT initiatives, balanced against risks such as potential single points of failure. 8

16 Objective 2: DoD s computing capabilities will be developed such that they enable NetOps to perform dynamic allocation of these resources. Key Performance Indicator: Assessment of the Computing Service Providers that are NetOps enabled. Implement dynamic manageability and control over computing infrastructure to enable integrated security and situational awareness (SA) of computing capabilities. Better leverage DAS, PPBES, and JCIDS to ensure that DoD Components incorporate functionality into shared computing resources that enables NetOps monitoring, control, and dynamic allocation of these resources. Ensure that enterprise-level architectures provide the standards for, and are used to guide, the inclusion of NetOps functionality into shared computing resource solutions. Objective 3: DoD wired and wireless transmission capability will be sufficiently sized, reliable, available, and flexible to support DoD s mission needs. Key Performance Indicator: Assessment of the Net-Centric Capability Portfolio wired and wireless programs that comply with the DoD IEA and net-centric architecture, and are on schedule. Develop and field transport capability identified by the Net-Centric Capability Portfolio (e.g., satellite communications (SATCOM), radios, mobile ad hoc networking) through evolution to a single virtual DoD terrestrial and SATCOM network providing capabilities and services from the sustaining base to the tactical edge and allowing dynamic allocation of these resources. Increase the application of advanced information transport technologies through research and development and by leveraging commercial capabilities. Transition DoD networks to Unified Capabilities, to include IPv6, and migrate from circuit-based technology to a converged (voice, video, and data) IP network and UC services environment. Ensure the optimal availability of electromagnetic spectrum to support DoD missions, improving DoD overall spectrum efficiency and influencing spectrum availability in the U.S. and worldwide. Increase the number of applications and services that are proposed for development and fielding that have assessed their operational bandwidth implications. 9

17 Objective 4: Routing and switching capabilities will enable DoD to interface common or disparate communications media or networks, in order to move data and information end-to-end across multiple transmission media. Key Performance Indicator: Assessment of communication bridges, satellite gateways, and satellite control capability gaps that are being closed across air and ground SATCOM. Expand wireless reach where no or limited communications infrastructure exists, through research to determine how best to address the need, then implementing the solutions identified. Provide sufficient satellite gateway capabilities for COCOMs to support the warfighter. Continue developing tactical and theater satellite gateways to support migration to IP and to extend the reach of DoD s federated IP networks to the tactical edge. Enable users to place secured and unsecured calls and interface with the public-switched telephone network by providing a solution that allows mobile user access to the Defense Switched Network. Objective 5: A globally open, stable, and secure Internet will support DoD s ability to collaborate and cooperate within the Department and with mission partners. Key Performance Indicator: Assessment of the Internet s ability to support DoD collaboration and cooperation within DoD and with mission partners. Advocate DoD equities at international technical and governance meetings (Internet Engineering Task Force, Internet Corporation for Assigned Names and Numbers, Internet Governance Forum, Réseaux IP Européens, and American Registry for Internet Numbers/North American Network Operators Group). Develop and test operational exercises, working with the Internet Root Server community and the ASD(NII)/DoD CIO Mission Assurance office, to determine the best approach to keeping the Internet open, secure, and stable under a range of threats. Promote the development of international cyberspace legal frameworks, working internally within DoD and externally with international partners, to increase the security and stability of the Internet. 10

18 GIG Content Delivery Service (GCDS) The lack of communication and the inability to rapidly access data and share information has been a persistent challenge to users at remote locations. In the past, users suffered from inconsistent and non-secure connections in accessing web-based applications and products. The DISA-provided GCDS the first DoD enterprise cloud service is an accredited, distributed computing platform deployed globally on both the Non-classified IP Router Network (NIPRNet) and Secret IP Router Network (SIPRNet). GCDS addresses the above challenge by optimizing the delivery of mission content and applications through standards-based, web technologies. The primary GCDS users are globally dispersed warfighters who must rapidly access mission data, providers who are adding increased capabilities to data centers, and owners of applications desired by end users. One benefit GCDS offers is global routing of content. The National Geospatial-Intelligence Agency (NGA) and U.S. Central Command (USCENTCOM) currently use this capability to allow forward deployed personnel to pull imagery data from the NGA to the area of responsibility. GCDS significantly improves availability, scalability and overall performance through the use of multiple remote sites with replicated data if one site is unreachable, data is automatically provided by the next available one. Scalability is improved when the remote site, instead of the data center, serves increased traffic. All of these changes enhance the user experience through better page load time and immediate, reliable access to web content. GCDS reached new heights in 2008 by exhibiting tremendous growth and success. Some notable accomplishments include an 83 percent increase in customer web applications, doubling of network capacity and increased customer satisfaction for 24-hour customer support. Testimonials include an end user from the Combined Joint Task Force (CJTF) 76 Continental U.S. (CONUS) who stated, GCDS has made a very significant improvement in CJTF-82 s ability to collaborate, share information, and disseminate information between CONUS and Afghanistan. In addition, LtCol Randy Ross, Chief C2 Systems Branch (USCENTCOM CCJ3) stated, No debating that our ability to effectively access information will continue to increase in importance throughout the battlefield. To this end, GCDS will be leveraged as an effective weapon towards ensuring information flow. 3 3 David Honeywell, GIG Content Delivery Services GCDS Presentation, DISA Conference, April

19 Battlefield Airborne Communications Node (BACN) & Rapid Attack Information Dissemination Execution Relay (RAIDER) Communications Capabilities With several incompatible Tactical Data Links and data and voice communications systems currently employed throughout the Services, the ability to pass time-sensitive information to warfighters in the air and on the ground is not an easy task. As commanders are forced to deal with ever increasing amounts of tactical information, lack of information exchange across the battlefield can be detrimental. Increasing situational awareness, reducing the kill chain timeline and providing reliable Command and Control (C2) communications have long been critical warfighter needs. C2 is the backbone of military operations. BACN and RAIDER are new systems that together significantly enhance C2 ability. BACN translates a diverse array of incoming signals and re-formats that data into information sent to receivers operating on different systems. The BACN concept was first introduced in 2004, then demonstrated in Joint Expeditionary Force Experiment (JEFX) 2006 and 2008, and has since gone on to prove its value to the warfighter in combat. BACN expands, stabilizes and improves communications, with no changes required to warfighter training, equipment, or procedures. RAIDER acts as a ground gateway to facilitate airborne and land mobile network communications. RAIDER can provide range extension and translation for data links while supporting up to 500 warfighters on the ground, using various voice and data communications systems. When coupled with the vast array of radio equipment and connection options installed in RAIDER, ground mobile users have an unprecedented ability to access information. During JEFX 06, RAIDER acted as a wireless IP-network connection point to provide communication users on the ground with beyond line-of-sight reach-back connectivity to the GIG, and allowed access to tactical data and imagery hosted on BACN. More recently, BACN has supported close air support, convoy, time sensitive targeting and air drop missions with great success. Based on over 700 contact situations, there has been an approximately 25% reduction in the time it takes for ground units to establish communications with close air support aircraft. This improved communications speed has also enabled an approximately 45% increase in kinetic results bombs on target in support of our ground forces. These results are not just limited to combat operations. BACN provides the United Nations World Food Program convoy commander with the ability to mitigate attack exposure through continuous contact with air support and ground command channels in complex, mountainous terrain. BACN also enables coalition forces (U.S., British, French, and Dutch) to extend and unify the air picture with air track, aircraft orbit and targeting information. These airborne and ground gateways link air-to-air, air-to-ground, and ground mobile networks and share large amounts of information with operational resources. In summary, BACN and RAIDER combine to give pilots and ground personnel an ability to communicate among disparate systems in the most challenging circumstances. 4 4 Derived from the following sources: -- David L. Richards, Capt, USAF, News from the Source BACN Update, Air Force Print News Today, July 28, Lt.Gen. Michael W. Peterson, USAF, Which emerging technology will have the biggest impact on your organization in the future? AFCEA Signal Magazine, June Lt Larry van der Oord, Advancing communication capability to the tactical edge, Intercom, June Wikipedia, Battlefield Airborne Communications Node (BACN) 12

20 Synchronized and Responsive Operations The DoD Information Enterprise infrastructure, critical assets, and capabilities are operated, secured, and defended in a synchronized manner by all DoD Components to support commanders in achieving mission success. The Synchronized and Responsive Operations goal of this strategic plan is for all DoD Components to operate, secure, and defend the DoD Information Enterprise consistently. Operating in this coordinated manner will contribute significantly to mission success, help achieve and maintain cyberspace superiority within a contested environment, and support authorized users access to timely and trusted information when and where it is needed. This goal entails establishing GIG situational awareness from the tactical edge to the core, improving NetOps capabilities, enhancing C2 capabilities for allocating and managing DoD IE resources, and strengthening enforcement of DoD IE policies and standards. Information sharing across organizational boundaries and functional disciplines will be the norm. DoD personnel will increasingly rely upon timely access to trusted, secure information that is shared to facilitate decision-making processes at all levels of the command structure. Improving DoD IE customer satisfaction and confidence will be essential to achieving the Department-wide culture changes necessary to overcome barriers to information sharing. Effective operations in cyberspace, in particular, must be assured through proactive operations management and unrelenting vigilance by the DoD IE support community. To achieve and maintain the dominant position in the militarily-relevant sectors of cyberspace, DoD must plan and execute its IE operations in a manner that leverages our technological advantage over potential adversaries and continually widens that gap. DoD IE operations must strive towards establishing and maintaining a balance among many competing priorities (including the need for increasing network security while still ensuring overall mission success) by understanding and proactively managing operational risks to the DoD Information Enterprise. DoD IE operations must enable a persistent, dominant information environment that supports broader national, DoD, and IC objectives that assure U.S. and Allied freedom of action in cyberspace and supported domains. Four objectives will need to be accomplished to realize this goal. First, DoD IE operations will assure the availability, protection, and integrity of the DoD Information Enterprise, which encompasses DoD and IC networks, systems, enterprise services, 13

Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion

Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

UNITED STATES AIR FORCE Air Force Product Support Enterprise Vision July 2013 Foreword Product Support is a set of functions and products that enables operational capability and readiness of systems, subsystems,

Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

FROM THE DOD CIO The challenge of managing information technology (IT) within the Department of Defense has never been greater. The Department s mission continues to expand to encompass military, peacekeeper,

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

Integrated C4isr and Cyber Solutions When Performance Matters L-3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

Secure Wireless Architecture Type-1: Reduce Costs with a Common Infrastructure for Classified and Unclassified Traffic Abstract Until now, defense, intelligence, and civilian agencies that wanted to transmit

ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE A White Paper prepared by the AFCEA Intelligence Committee April 2008 Serving Intelligence Professionals and their Community SpringIntel08_WhitePaperCover

WHITE PAPER APRIL 2012 Leading an Implementation Campaign to Address the Convergence of Healthcare Reform Initiatives New healthcare reforms have created an unprecedented impact on hospital systems operations.

ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or

Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT IntelliDyne, LLC MARCH 2012 Strategic Impact Pillars for Optimizing Business Process Management in Government

Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business

5 Steps to Choosing the Right BPM Suite BPM Suites can deliver significant business benefits and a fast ROI but only if you choose the right one By Laura Mooney, Metastorm Copyright 2009, Metastorm Inc.

STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

Agile Master Data Management A Better Approach than Trial and Error A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary Market leading corporations are

2013-2016 Strategic Plan Office for Information Technology Message from the Chief Information Officer Shortly after Governor Corbett took office in 2011, the Office of Administration/Office for Information

This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army

FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

TESTIMONY OF Richard A. Spires Chief Information Officer U.S. Department of Homeland Security Before the House Committee on Oversight and Government Reform February 27, 2013 Chairman Issa, Ranking Member

SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange SaaS Health Insurance Exchanges Improving Services through More Cost-Efficient Delivery States are charged with making

Point of View: FINANCIAL SERVICES DELIVERING BUSINESS VALUE THROUGH ENTERPRISE DATA MANAGEMENT THROUGH ENTERPRISE DATA MANAGEMENT IN THIS POINT OF VIEW: PAGE INTRODUCTION: A NEW PATH TO DATA ACCURACY AND

BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based

Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

WHITE PAPER The Small Business Communications Dilemma Small business owners make decisions every day that affect whether they succeed or fail. In addition to decisions about their core business, they are

Chapter6 Nuclear Command and Control System 6.1 Overview The U.S. Nuclear Command and Control System (NCCS) relies on a collection of activities, processes, and procedures performed by appropriate military